Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/06/2024, 22:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtwitblocker.com/extension.php?it=chasmX7KD7&_d=2&ja=99970&iw=10223-5412-100-73171-39230-1719181381&iv=as&c_click_id=10223-5412-100-73171-39230-1719181381
Resource
win10-20240404-en
General
-
Target
https://youtwitblocker.com/extension.php?it=chasmX7KD7&_d=2&ja=99970&iw=10223-5412-100-73171-39230-1719181381&iv=as&c_click_id=10223-5412-100-73171-39230-1719181381
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636555096189989" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 596 1104 chrome.exe 73 PID 1104 wrote to memory of 596 1104 chrome.exe 73 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 3304 1104 chrome.exe 75 PID 1104 wrote to memory of 2848 1104 chrome.exe 76 PID 1104 wrote to memory of 2848 1104 chrome.exe 76 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77 PID 1104 wrote to memory of 4516 1104 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://youtwitblocker.com/extension.php?it=chasmX7KD7&_d=2&ja=99970&iw=10223-5412-100-73171-39230-1719181381&iv=as&c_click_id=10223-5412-100-73171-39230-17191813811⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe3e8e9758,0x7ffe3e8e9768,0x7ffe3e8e97782⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:22⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2828 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2836 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=844 --field-trial-handle=1708,i,9960146279424812554,18067908347173411482,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa2fb876861c681786ef5c8ff2267dc0
SHA1c87959a5a11ba509635b6c50b9bc2e6ad69f7cd8
SHA2565a24307c82415a168601509683dde56076010502e7e1ba610f4488e44d000d96
SHA512d05992d6a0ac051c2ec5de438512bfd78039b3593643f1f500fce0e0c36404cd20ef12ba51c5f45a031486eaf4835c16f4ffa4c85ce19be9d5ad2e16ae3ce677
-
Filesize
536B
MD5a4f3533472e83c3c241c716d149feec2
SHA19ea67898b24055895f51f106c4ddb5b291a848b1
SHA256c55e340137143a12f2a2f07fe5ad961a2a1f44372fa1960f9b8920b3e46bc246
SHA512eaec4c0f0a64e7079c3f4fbbf4d40b0b73b9a085c88a0a96f090c098c3ddefca01cafbb8c04a1624013f4cdb61324bc6ffcc9e4ee811af9d44f46eabf05c6206
-
Filesize
6KB
MD57d01c21447f92372583492986591d0c9
SHA1987f76f5734406bde3d1e850b51837f60b91e228
SHA2564f327dc671e48f090bf1982241831f3bbe30f2aae0d122f09340e91c28b8c8c9
SHA512a7cd2002a4d9f8b9127064305b1a3c0b6f37a471d69ab65fcaeea14083124caf013e5d0f762dbdc216a4f057660a0e8094d5ab7df6e48e0635d77323b2b993c9
-
Filesize
6KB
MD5f1da13215fd39d8eb55c98a412ebe45f
SHA1a2fcc5e5c1e709f64e818985f0dce72705fa6577
SHA256279dded4fcb7657f405cb154e617defc18dd8449db4a10a23e78c5e929fa256d
SHA5125b94e32ff476b9a4375774142dc53affa6ea77b0b32fd0c1b4e36eff62120031ae8e408bdf1defbde27d71d8d8a332e50b7b9c437aa7c56112d15b76ff21d977
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a6b41207-59fc-4c71-a1fc-20c77d781275.tmp
Filesize6KB
MD5e0941f80780910b4e62538f0fbbe9b30
SHA16f1bac4fa38bd79ac7d4967dbf1c3343112fa73f
SHA25637770b5481cd0e61ab115ce5f22cf6b8e41af3b38925c1e11ba871a35b008c09
SHA5120ad2c8de7f7355504b4f1c8081b7052325d0c50e6d6800103897e74e7bbde5073ffea670af2cf63b0eb6d103ffb3318f9f84872dbfd0e2d1903423a6ad787ed3
-
Filesize
136KB
MD527fe36c320259b6671f6b5fccc2ee24f
SHA1d8768787ce0d2adc2bdfd7b4ecfc26a1082f8865
SHA256a5fd912ca6773fff28413a22f288ecae4c7e5fb83e7e850123980b3a6659da27
SHA5124952e3c1462d27db94cf13339e68ffcbbf4489871f6e4adfb0592d349f99c5014435edf3752340955d195cff39ef47aabc273ad71f05054c48380de61fca24dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd